Analysis

  • max time kernel
    134s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    08/07/2020, 07:04

General

  • Target

    b6a8bd9f29a479b0ce5b4d5a4a090949.exe

  • Size

    480KB

  • MD5

    b6a8bd9f29a479b0ce5b4d5a4a090949

  • SHA1

    60af38b1d1b1a84ff7d22b195b7ea06e15fa62c9

  • SHA256

    1ca0fa0599ad3337700cfe55be2f6d0462a7e4301f8ccfdd87167a66754e7e71

  • SHA512

    4bf9a8df42e4099c2a22df1af32f2fe9ad645ab21b539f25ae11a0458dcef4c68b51a1d41fda50e1b1fde92d02213e94bd3879a41b6ce968567b67e4c8c7b708

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Checks for installed software on the system 1 TTPs 29 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6a8bd9f29a479b0ce5b4d5a4a090949.exe
    "C:\Users\Admin\AppData\Local\Temp\b6a8bd9f29a479b0ce5b4d5a4a090949.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Checks for installed software on the system
    PID:3932

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads